Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 <html class="reftest-wait">
2 <head>
3 <script language="javascript">
5 function start() {
6 remotePC = new mozRTCPeerConnection();
7 var cand = new mozRTCIceCandidate(
8 {candidate: "1 1 UDP 1 127.0.0.1 34567 type host",
9 sdpMid: "helloworld",
10 sdbMid: "helloworld", // Mis-spelt attribute for bug 833948 compatibility.
11 sdpMLineIndex: 1
12 });
13 try {remotePC.addIceCandidate(cand);} catch(e) {} // bug 842075 - remove try when fixed
14 try {remotePC.addIceCandidate(cand, function(sdp){}, finish);} catch(e) {} // bug 842075 - remove try when fixed
15 finish();
16 }
18 function finish(arg) {
19 document.documentElement.removeAttribute("class");
20 }
21 </script>
22 </head>
23 <body onload="setTimeout(start, 100)">
24 </body>
25 </html>